<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-demarco-oauth-status-assertions-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="OAuth Status Assertions">OAuth Status Assertions</title>
    <seriesInfo name="Internet-Draft" value="draft-demarco-oauth-status-assertions-01"/>
    <author fullname="Giuseppe De Marco">
      <organization>Dipartimento per la trasformazione digitale</organization>
      <address>
        <email>gi.demarco@innovazione.gov.it</email>
      </address>
    </author>
    <author fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <email>orie@transmute.industries</email>
      </address>
    </author>
    <author fullname="Francesco Marino">
      <organization>Istituto Poligrafico e Zecca dello Stato</organization>
      <address>
        <email>fa.marino@ipzs.it</email>
      </address>
    </author>
    <date year="2024" month="June" day="18"/>
    <keyword>digital credentials</keyword>
    <keyword>revocation</keyword>
    <abstract>
      <?line 106?>

<t>Status Assertion is a signed object that demonstrates the validity status of a
digital credential.
These assertions are periodically provided
to holders, who can present these to verifier along
with the corresponding digital credentials.
The approach outlined in this document
makes the verifier able to check the non-revocation of a digital credential
without requiring to query any third-party entities.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://peppelinux.github.io/draft-demarco-status-attestations/draft-demarco-oauth-status-assertions.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-demarco-oauth-status-assertions/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/peppelinux/draft-demarco-status-attestations"/>.</t>
    </note>
  </front>
  <middle>
    <?line 117?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Status Assertions ensure the non-revocation of digital
credentials, whether in JSON Web Tokens (JWT) or CBOR Web Tokens (CWT)
format. Status Assertions function
similarly to OCSP Stapling (<xref target="RFC6066"/>), allowing clients to present to the
relying parties
time-stamped assertions provided by the credential issuer.
The approach outlined in this specification enables the
verification of credentials against revocation without
direct queries to third-party systems,
enhancing privacy, reducing latency, and
faciliting offline verification.</t>
      <t>The figure below illustrates the process by which a client,
such as a wallet instance,
requests and obtains a Status Assertion from the credential issuer.</t>
      <artwork type="ascii-art"><![CDATA[
+-----------------+                              +-------------------+
|                 | Requests Status Assertions   |                   |
|                 |----------------------------->|                   |
| Client          |                              | Credential Issuer |
|                 | Status Assertions            |                   |
|                 |<-----------------------------|                   |
+-----------------+                              +-------------------+
]]></artwork>
      <t><strong>Figure 1</strong>: Status Assertion Issuance Flow.</t>
      <t>The figure below illustrates the process by which a client
presents the Status Assertion along with the corresponding digital credential.</t>
      <artwork type="ascii-art"><![CDATA[
+-- ----------------+                             +----------+
|                   | Presents Digital Credential |          |
| Client            | and Status Assertion        | Verifier |
|                   |---------------------------->|          |
+-------------------+                             +----------+
]]></artwork>
      <t><strong>Figure 2</strong>: Status Assertion Presentation Flow.</t>
      <t>In summary, the credential issuer provides the client with a
Status Assertion, which is linked to a Digital Credential. This enables
the client to present both the digital credential and its
Status Assertion to a verifier as proof of the digital credential's
validity status.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This specification uses the terms "End-User", "Entity" as defined by
OpenID Connect Core <xref target="OpenID.Core"/>, the term "JSON Web Token (JWT)"
defined by JSON Web Token (JWT) <xref target="RFC7519"/>,
the term "CBOR Web Token (CWT)" defined in <xref target="RFC8392"/>, "Client" as
defined <xref target="RFC6749"/>, "Verifiable Presentation" defined in [@OpenID4VP].</t>
      <dl>
        <dt>Digital Credential:</dt>
        <dd>
          <t>A set of one or more claims about a subject made by a Credential Issuer.
Alternative names are "Verifiable Credential" or "Credential".</t>
        </dd>
        <dt>Holder:</dt>
        <dd>
          <t>An entity that possesses Verifiable Credentials and has
control over them to present them to the Verifiers as Verifiable Presentations.</t>
        </dd>
        <dt>Credential Issuer:</dt>
        <dd>
          <t>Entity that is responsible for the issuance of the Digital Credentials.
The Issuer is responsible for the lifecycle of their issued
Digital Credentials and their validity status.</t>
        </dd>
        <dt>Verifier:</dt>
        <dd>
          <t>Entity that relies on the validity of the Digital Credentials presented to it.
This Entity, also known as a Relying Party, verifies the authenticity and
validity of the Digital Credentials, including their revocation status,
before accepting them.</t>
        </dd>
        <dt>Wallet Instance:</dt>
        <dd>
          <t>The digital Wallet in control of a User, also known as Wallet.
It securely stores the User's Digital Credentials. It can present
Digital Credentials to Verifiers
and request Status Assertions from Issuers under the control of the User.
For the purposes of this specification, the Wallet Instance is
considered as a Client.</t>
        </dd>
      </dl>
    </section>
    <section anchor="rationale">
      <name>Rationale</name>
      <t>There are cases where the Verifier only needs
to check the revocation status of a Digital Credential at the time of
presentation, and therefore it should not be allowed to
check the status of a Digital Credential over time due to some
privacy constraints,
in compliance with national privacy regulations.</t>
      <t>For instance, consider a scenario where a Verifier's repeated access to a
status list, such as the one defined in
<xref target="draft-ietf-oauth-status-list"/>
to check the revocation status of a Digital Credential could
be deemed as excessive monitoring of the End-User's activities.</t>
      <t>This could potentially infringe upon the End-User's right to privacy,
as outlined in
<xref target="ECHR-ART8"/> and
in the the European Union's General Data Protection Regulation
<xref target="GDPR"/>,
by creating a detailed profile of the End-User's
Digital Credential status without explicit consent for
such continuous surveillance.</t>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <t>The general requirements for the implementation of Status Assertion are
listed in this section. The Status Assertion:</t>
      <ul spacing="normal">
        <li>
          <t><bcp14>SHOULD</bcp14> be presented in conjunction with the Digital Credential.</t>
        </li>
        <li>
          <t><bcp14>MUST</bcp14> include information that links it to the
referenced Digital Credential;</t>
        </li>
        <li>
          <t><bcp14>MUST</bcp14> be timestamped with its issuance datetime,
using a timestamp which is at or after the time of
Digital Credential issuance which it refers;</t>
        </li>
        <li>
          <t><bcp14>MUST</bcp14> contain the expiration datetime after which
the Status Assertion <bcp14>MUST NOT</bcp14> be considered valid anymore,
and the Digital Credential it refers
<bcp14>SHOULD NOT</bcp14> be considered valid anymore. The expiration datetime <bcp14>MUST</bcp14> be
superior to the Status Assertion issuance datetime and it <bcp14>MUST</bcp14> end before
the expiration datetime of the Digital Credential;</t>
        </li>
        <li>
          <t><bcp14>MUST</bcp14> enable the offline use cases by employing validation using
a cryptographic signature and the cryptographic public key of the
Credential Issuer.</t>
        </li>
        <li>
          <t><bcp14>MUST NOT</bcp14> contain personal information about the User who owns
the Digital Credential to which the Status Assertion refers.</t>
        </li>
      </ul>
    </section>
    <section anchor="proof-of-possession-of-a-credential">
      <name>Proof of Possession of a Credential</name>
      <t>The concept of Proof of Possession (PoP) of a Credential within the
framework of the Status Assertion specification encompasses a broader
perspective than merely possessing the digital bytes of the Credential.</t>
      <t>It involves demonstrating rightful control or ownership over the
Credential, which can manifest in various forms depending on the
technology employed and the nature of the Digital Credential itself.
For instance, a Digital Credential could be presented visually (de-visu)
with a personal portrait serving as a binding element.</t>
      <t>While this specification does not prescribe any additional methods
for the proof of possession of the Credential, it aims to offer
guidance for concrete implementations utilizing common proof of
possession mechanisms. This includes, but is not limited to:</t>
      <ol spacing="normal" type="1"><li>
          <t>Having the digital representation of the Digital Credential (the bytes).</t>
        </li>
        <li>
          <t>Controlling the confirmation method of the Credential, using the Credential's <tt>cnf</tt> parameter.</t>
        </li>
      </ol>
      <t>The essence of requiring proof of possession over the Credential
through the confirmation method, such has proving the control of the
cryptographic material related to a Credential, is
to ensure that the entity in possession of the Credential can execute
actions exclusively reserved to the legitimate Holder.
The dual-layered approach of requiring both possession of the
Credential and control over it, reinforces the security and integrity
of the Status Assertion process.
This ensures that the Holder requesting a Status Assertion is indeed
the same Holder to which the Credential was originally issued,
affirming the authenticity and rightful possession of the Credential.</t>
    </section>
    <section anchor="status-assertion-request">
      <name>Status Assertion Request</name>
      <t>The following diagram shows the Wallet Instance requesting a
Status Assertion to a Credential Issuer,
related to a specific Credential issued by the same Credential Issuer.</t>
      <artwork type="ascii-art"><![CDATA[
+-------------------+                                  +--------------------+
|                   |                                  |                    |
|  Wallet Instance  |                                  | Credential Issuer  |
|                   |                                  |                    |
+--------+----------+                                  +----------+---------+
         |                                                        |
         | HTTP POST /status                                      |
         |  status_assertion_requests = [$StatusAssertionRequest] |
         +-------------------------------------------------------->
         |                                                        |
         |  Status Assertion Responses [...]                      |
         <--------------------------------------------------------+
         |                                                        |
+--------+----------+                                  +----------+---------+
|                   |                                  |                    |
|  Wallet Instance  |                                  | Credential Issuer  |
|                   |                                  |                    |
+-------------------+                                  +--------------------+
]]></artwork>
      <t>The Wallet Instance sends the Status Assertion request to the
Credential Issuer, where:</t>
      <ul spacing="normal">
        <li>
          <t>The request <bcp14>MUST</bcp14> contain the base64url encoded hash value of the Digital Credential's
Issuer signed part, such as the Issuer Signed JWT using [@SD-JWT-VC],
or the Mobile Security Object using [@ISO 18013-5],
for which the Status Assertion is requested, and enveloped in a signed
Status Assertion Request object.</t>
        </li>
        <li>
          <t>The Status Assertion Request object <bcp14>MUST</bcp14> be signed with the private key corresponding
to the confirmation claim assigned by the Issuer and contained within
the Digital Credential.</t>
        </li>
      </ul>
      <t>The Status Assertion Request object <bcp14>MUST</bcp14> contain the parameters defined in the following table.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Header</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>typ</strong></td>
            <td align="left">It <bcp14>MUST</bcp14> be set to <tt>status-assertion-request+jwt</tt> when JWT format is used. It <bcp14>MUST</bcp14> be set to <tt>status-assertion-request+cwt</tt> when CWT format is used.</td>
            <td align="left">
              <xref target="RFC7516"/> Section 4.1.1, <xref target="RFC9596"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>alg</strong></td>
            <td align="left">A digital signature algorithm identifier such as per IANA "JSON Web Signature and Encryption Algorithms" registry. It <bcp14>MUST NOT</bcp14> be set to <tt>none</tt> or any symmetric algorithm (MAC) identifier.</td>
            <td align="left">
              <xref target="RFC7516"/> Section 4.1.1</td>
          </tr>
        </tbody>
      </table>
      <table>
        <thead>
          <tr>
            <th align="left">Payload</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>iss</strong></td>
            <td align="left">Status Assertion Request Issuer identifier. The value is supposed to be used for identifying the Wallet that has issued the request. It is out of scope for this document defining how this value should be set.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>aud</strong></td>
            <td align="left">It <bcp14>MUST</bcp14> be set with the Credential Issuer Status Assertion endpoint URL as value that identify the intended audience.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>exp</strong></td>
            <td align="left">UNIX Timestamp with the expiration time of the JWT. It <bcp14>MUST</bcp14> be superior to the value set for <tt>iat</tt> .</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/>, <xref target="RFC7515"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>iat</strong></td>
            <td align="left">UNIX Timestamp with the time of JWT/CWT issuance.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>jti</strong></td>
            <td align="left">Unique identifier for the JWT.</td>
            <td align="left">
              <xref target="RFC7519"/> Section 4.1.7</td>
          </tr>
          <tr>
            <td align="left">
              <strong>cti</strong></td>
            <td align="left">Unique identifier for the CWT.</td>
            <td align="left">
              <xref target="RFC7519"/> Section 4.1.7</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash</strong></td>
            <td align="left">Hash value of the Digital Credential the Status Assertion is bound to.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash_alg</strong></td>
            <td align="left">The Algorithm used of hashing the Digital Credential to which the Status Assertion is bound. The value <bcp14>SHOULD</bcp14> be set to <tt>sha-256</tt>.</td>
            <td align="left">this specification</td>
          </tr>
        </tbody>
      </table>
      <t>Below is a non-normative example of a Status Assertion Request with
the JWT headers and payload represented without applying signature and
encoding:</t>
      <artwork><![CDATA[
{
    "alg": "ES256",
    "typ": "status-assertion-request+jwt"
}
.
{
    "iss": "0b434530-e151-4c40-98b7-74c75a5ef760",
    "aud": "https://issuer.example.org/status-assertion-endpoint",
    "iat": 1698744039,
    "exp": 1698830439,
    "jti": "6f204f7e-e453-4dfd-814e-9d155319408c",
    "credential_hash": $hash-about-Issuer-Signed-JWT
    "credential_hash_alg": "sha-256"
}
]]></artwork>
      <t>Below is a non-normative example of a Status Assertion Request object in CWT format
represented in CBOR diagnostic notation format <xref target="RFC8152"/>, where the CWT headers
and payload are presented without applying signature and encoding for better readability:</t>
      <artwork><![CDATA[
   [
       / protected / << {
       / alg / 1: -7 / ES256 /
       / typ / 16: -7 / status-assertion-request+cwt /
     } >>,
     / unprotected / {
     },
     / payload / << {
       / iss    / 1: 0b434530-e151-4c40-98b7-74c75a5ef760 /,
       / aud    / 3: https://issuer.example.org/status-assertion-endpoint /,
       / iat    / 6: 1698744039 /,
       / exp    / 4: 1698830439 /,
       / cti    / 7: 6f204f7e-e453-4dfd-814e-9d155319408c /,
       / credential_hash / 8: $hash-about-MobileSecurityObject /,
       / credential_hash_alg / 9: sha-256 /
     } >>,
   ]
]]></artwork>
      <t>Below a non-normative example representing a Status Assertion Request array with a
single Status Assertion Request object in JWT format.</t>
      <artwork><![CDATA[
POST /status HTTP/1.1
Host: issuer.example.org
Content-Type: application/json

{
    "status_assertion_requests" : ["${base64url(json({typ: (some pop for status-assertion)+jwt, ...}))}.payload.signature", ... ]
}
]]></artwork>
      <t>The Status Assertion HTTP request can be sent to a single Credential Issuer
regarding multiple Digital Credentials, and <bcp14>MUST</bcp14> contain a JSON object with
the member <tt>status_assertion_requests</tt>.</t>
      <t>The <tt>status_assertion_requests</tt> <bcp14>MUST</bcp14> be set with an array of strings, where
each string within the array represents a Digital Credential
Status Assertion Request object.</t>
      <t>The Credential Issuer that receives the Status Assertion Request object
<bcp14>MUST</bcp14> validate that the Wallet Instance making the request is
authorized to request Status Assertions.
Therefore the following requirements <bcp14>MUST</bcp14> be satisfied:</t>
      <ul spacing="normal">
        <li>
          <t>The Credential Issuer <bcp14>MUST</bcp14> verify the compliance of all elements in the <tt>status_assertion_requests</tt> object
using the confirmation method contained within the Digital Credential where the Status Assertion Request
object is referred to;</t>
        </li>
        <li>
          <t>The Credential Issuer <bcp14>MUST</bcp14> verify that it is the legitimate Issuer of the Digital Credential
to which each Status Assertion Request object refers.</t>
        </li>
      </ul>
    </section>
    <section anchor="status-assertion-response">
      <name>Status Assertion Response</name>
      <t>The response <bcp14>MUST</bcp14> include a JSON object with a member
named <tt>status_assertion_responses</tt>, which contains the
Status Assertions and or the Status Assertion Errors
related to the request made by the
Wallet Instance. In the non-normative example below is
represented an HTTP Response with the
<tt>status_assertion_responses</tt> JSON member:</t>
      <artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/json

{
    "status_assertion_responses": ["${base64url(json({typ: status-assertion+jwt, ...}))}.payload.signature", ... ]
}
]]></artwork>
      <t>The member <tt>status_assertion_responses</tt> <bcp14>MUST</bcp14> be an array of strings,
where each of them represent a Status Assertion Response object,
as defined in
<xref target="status-assertion">the section Status Assertion</xref> or a Status Assertion Error object,
as defined in <xref target="status-assertion-error">the section Status Error</xref>.</t>
      <t>For each entry in the <tt>status_assertion_responses</tt> array, the following requirements are met:
- Each element in the array <bcp14>MUST</bcp14> match the corresponding element in the request array at
the same position index to which it is related, eg: <em>[requestAboutA, requestAboutB]</em> may produce <em>[responseAboutA, responseErrorAboutB]</em>.
- Each element <bcp14>MUST</bcp14> contain the error or the status of the assertion, using the <tt>typ</tt> member
set to "status-assertion+{jwt,cwt}" or "status-assertion-error+{jwt,cwt}", depending by the object type.
- The corresponding entry in the response <bcp14>MUST</bcp14> be of the same data format as requested. For example,
if the entry in the request is "jwt", then the entry at the same position in the response <bcp14>MUST</bcp14> also be "jwt".
- The corresponding entry in the response <bcp14>MUST NOT</bcp14> contain any
information regarding the Verifier to whom it may be presented,
such as the Verifier identifier as the intended audience.</t>
    </section>
    <section anchor="status-assertion-error">
      <name>Status Assertion Error</name>
      <t>If the Status Assertion is requested for a non-existent, expired, revoked
or invalid Digital Credential, the
Credential Issuer <bcp14>MUST</bcp14> respond with an HTTP Response with the status
code set to 200 and the <tt>status_assertion_responses</tt> array with the related
Status Assertion Error object.</t>
      <t>The Status Assertion Error <bcp14>MUST NOT</bcp14> be presented or provided to a Verifier,
the only audience of the Status Assertion Error is the Holder of the Credential
that has requested the Status Assertion. Therefore,
it is not necessary that the Status Assertion Error
contains the parameter <tt>aud</tt>; if present, it <bcp14>MUST</bcp14> be set to the same
value as the <tt>iss</tt> parameter used by the Wallet in the corresponding
Status Assertion Request object.</t>
      <t>Below a non-normative example of a Status Assertion Error object in JWT format,
with the headers and payload represented in JSON and without applying the signature.</t>
      <artwork><![CDATA[
{
    "alg": "ES256",
    "typ": "status-assertion-error+jwt",
    "kid": "Issuer-JWK-KID"
}
.
{
    "iss": "https://issuer.example.org",
    "jti": "6f204f7e-e453-4dfd-814e-9d155319408c"
    "credential_hash": $hash-about-Issuer-Signed-JWT,
    "credential_hash_alg": "sha-256",
    "error": "credential_revoked",
    "error_description": "Credential is revoked."
    }
}
]]></artwork>
      <t>The Status Assertion Error object <bcp14>MUST</bcp14> contain the parameters described in the
table below:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Header</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>typ</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Depending on the related Status Assertion Request object format, it <bcp14>MUST</bcp14> be set to <tt>status-assertion-error+jwt</tt> or <tt>status-assertion-error+cwt</tt>.</td>
            <td align="left">
              <xref target="RFC7516"/> Section 4.1.1</td>
          </tr>
          <tr>
            <td align="left">
              <strong>alg</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Algorithm used to verify the cryptographic signature of the Status Assertion Error. Status Assertion Error that do not need to be signed <bcp14>SHOULD</bcp14> set the <tt>alg</tt> value to <tt>none</tt>. For further clarification about the requirement of signing the Status Assertion Errors, see Section <xref target="rationale-about-the-unsigned-status-assertion-errors">Rationale About The Unsigned Status Assertion Errors</xref>.</td>
            <td align="left">
              <xref target="RFC7516"/> Section 4.1.1</td>
          </tr>
        </tbody>
      </table>
      <table>
        <thead>
          <tr>
            <th align="left">Payload</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>iss</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. It <bcp14>MUST</bcp14> be set to the identifier of the Issuer.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>jti</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Unique identifier for the JWT.</td>
            <td align="left">
              <xref target="RFC7519"/> Section 4.1.7</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. The hash value <bcp14>MUST</bcp14> match the one contained in the Status Assertion Request to which the Status Assertion Error is related.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash_alg</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. The hash algorithm <bcp14>MUST</bcp14> match the one contained in the Status Assertion Request to which the Status Assertion Error is related.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>error</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. The value <bcp14>SHOULD</bcp14> be assigned with one of the error types defined in <xref target="RFC6749"/><eref target="https://tools.ietf.org/html/rfc6749#section-5.2">Section 5.2</eref> or defined in the Section <eref target="status-assertion-error-values">Status Assertion Error Values</eref>.</td>
            <td align="left">
              <xref target="RFC7519"/> Section 4.1.7</td>
          </tr>
          <tr>
            <td align="left">
              <strong>error_description</strong></td>
            <td align="left">
              <bcp14>OPTIONAL</bcp14>. Text that clarifies the nature of the error, such as attribute changes, revocation reasons, in relation to the <tt>error</tt> value.</td>
            <td align="left">
              <xref target="RFC7519"/> Section 4.1.7</td>
          </tr>
        </tbody>
      </table>
      <section anchor="rationale-about-the-unsigned-status-assertion-errors">
        <name>Rationale About The Unsigned Status Assertion Errors</name>
        <t>To mitigate potential resource exhaustion attacks where an adversary could issue hundreds of fake Status Assertion Requests to force an Issuer to sign numerous Status Assertion Errors, it is advisable to set the header parameter<tt>alg</tt> value to <tt>none</tt> for Status Assertion Errors that do not require signatures. This approach conserves computational resources and prevents abuse, especially in scenarios where the Issuer's implementation could be vulnerable to resource exhaustion attacks. However, even if it is out of the scopes of this specification determine in which the Status Error Assertion signatures are necessary, when the Issuer signs the Status Assertion Errors the Client that received them <bcp14>MUST</bcp14> validate the signature.</t>
      </section>
      <section anchor="status-assertion-error-values">
        <name>Status Assertion Error Values</name>
        <t>The <tt>error</tt> parameter for the Status Assertion Error object <bcp14>MUST</bcp14> be set with one of the values defined in the table below, in addition to the values specified in <xref target="RFC6749"/>:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Error Parameter Value</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <strong>credential_revoked</strong></td>
              <td align="left">The Digital Credential results as already revoked. The reason of revocation <bcp14>MAY</bcp14> be provided in the <tt>error_description</tt> field.</td>
              <td align="left">this specification</td>
            </tr>
            <tr>
              <td align="left">
                <strong>credential_updated</strong></td>
              <td align="left">One or more information contained in the Digital Credential are changed. The <tt>error_description</tt> field <bcp14>SHOULD</bcp14> contain a human-readable text describing the general parameters updated without specifying each one.</td>
              <td align="left">this specification</td>
            </tr>
            <tr>
              <td align="left">
                <strong>credential_invalid</strong></td>
              <td align="left">The Digital Credential is invalid. The <tt>error_description</tt> field <bcp14>SHOULD</bcp14> contain the reason of invalidation.</td>
              <td align="left">this specification</td>
            </tr>
            <tr>
              <td align="left">
                <strong>invalid_request_signature</strong></td>
              <td align="left">The Status Assertion Request signature validation has failed. This error type is used when the proof of possession of the Digital Credential is found not valid within the Status Assertion Request.</td>
              <td align="left">this specification</td>
            </tr>
            <tr>
              <td align="left">
                <strong>credential_not_found</strong></td>
              <td align="left">The <tt>credential_hash</tt> value provided in the Status Assertion Request doesn't match with any active Digital Credential.</td>
              <td align="left">this specification</td>
            </tr>
            <tr>
              <td align="left">
                <strong>unsupported_hash_alg</strong></td>
              <td align="left">The hash algorithm set in <tt>credential_hash_alg</tt> is not supported.</td>
              <td align="left">this specification</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="status-assertion">
      <name>Status Assertion</name>
      <t>When a Status Assertion is requested to a Credential Issuer, the
Issuer checks the status of the Digital Credential and creates a
Status Assertion bound to it.</t>
      <t>If the Digital Credential is valid, the Credential Issuer
creates a new Status Assertion,
which a non-normative example is given below
where the format is JWT.</t>
      <artwork><![CDATA[
{
    "alg": "ES256",
    "typ": "status-assertion+jwt",
    "kid": $ISSUER-JWKID
}
.
{
    "iss": "https://issuer.example.org",
    "iat": 1504699136,
    "exp": 1504785536,
    "credential_hash": $hash-about-Issuer-Signed-JWT,
    "credential_hash_alg": "sha-256",
    "cnf": {
        "jwk": {...}
    }
}
]]></artwork>
      <t>The Status Assertion <bcp14>MUST</bcp14> contain the parameters defined below.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Header Parameter Name</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>alg</strong></td>
            <td align="left">A digital signature algorithm identifier such as per IANA "JSON Web Signature and Encryption Algorithms" registry. It <bcp14>MUST NOT</bcp14> be set to <tt>none</tt> or to a symmetric algorithm (MAC) identifier.</td>
            <td align="left">
              <xref target="RFC7515"/>, <xref target="RFC7517"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>typ</strong></td>
            <td align="left">It <bcp14>MUST</bcp14> be set to <tt>status-assertion+jwt</tt> when JWT format is used. It <bcp14>MUST</bcp14> be set to <tt>status-assertion+cwt</tt> when CWT format is used.</td>
            <td align="left">
              <xref target="RFC7515"/>, <xref target="RFC7517"/> and this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>kid</strong></td>
            <td align="left">Unique identifier of the Credential Issuer JWK. It is required when <tt>x5c</tt> or other cryptographic public key resolution identifiers are not used.</td>
            <td align="left">
              <xref target="RFC7515"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>x5c</strong></td>
            <td align="left">X.509 certificate chain about the Credential Issuer. It is required when <tt>kid</tt> or other parameter are not used.</td>
            <td align="left">
              <xref target="RFC7515"/></td>
          </tr>
        </tbody>
      </table>
      <table>
        <thead>
          <tr>
            <th align="left">Payload Parameter Name</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>iss</strong></td>
            <td align="left">It <bcp14>MUST</bcp14> be set to the identifier of the Issuer.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>iat</strong></td>
            <td align="left">UNIX Timestamp with the time of the Status Assertion issuance.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>exp</strong></td>
            <td align="left">UNIX Timestamp with the expiration time of the JWT. It <bcp14>MUST</bcp14> be greater than the value set for <tt>iat</tt>.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/>, <xref target="RFC7515"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash</strong></td>
            <td align="left">Hash value of the Digital Credential the Status Assertion is bound to.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash_alg</strong></td>
            <td align="left">The Algorithm used of hashing the Digital Credential to which the Status Assertion is bound. The value <bcp14>SHOULD</bcp14> be set to <tt>sha-256</tt>.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>cnf</strong></td>
            <td align="left">JSON object containing confirmation methods. The sub-member contained within <tt>cnf</tt> member, such as <tt>jwk</tt> for JWT and <tt>Cose_Key</tt> for CWT, <bcp14>MUST</bcp14> match with the one provided within the related Digital Credential. Other confirmation methods can be utilized when the referenced Digital Credential supports them, in accordance with the relevant standards.</td>
            <td align="left">
              <xref target="RFC7800"/> Section 3.1, <xref target="RFC8747"/> Section 3.1</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="interoperability-of-credential-issuers-supporting-status-assertions">
      <name>Interoperability of Credential Issuers Supporting Status Assertions</name>
      <t>This section outlines how Credential Issuers support Status Assertions,
detailing the necessary metadata and practices to integrate into their systems.</t>
      <section anchor="credential-issuer-metadata">
        <name>Credential Issuer Metadata</name>
        <t>The Credential Issuers that uses the Status Assertions <bcp14>MUST</bcp14> include in their
OpenID4VCI <xref target="OpenID4VCI"/> metadata the claims:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status_assertion_endpoint</tt>. <bcp14>REQUIRED</bcp14>. It <bcp14>MUST</bcp14> be an HTTPs URL indicating
the endpoint where the Wallet Instances can request Status Assertions.</t>
          </li>
          <li>
            <t><tt>credential_hash_alg_supported</tt>. <bcp14>REQUIRED</bcp14>. The supported Algorithm used by
the Wallet Instance to hash the Digital Credential for which the
Status Assertion is requested,  using one of the hash algorithms listed
in the <xref target="IANA-HASH-REG"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="issued-digital-credentials">
        <name>Issued Digital Credentials</name>
        <t>The Credential Issuers that uses the Status Assertions <bcp14>SHOULD</bcp14> include in the
issued Digital Credentials the object <tt>status</tt> with the
JSON member <tt>status_assertion</tt> set to a JSON Object containing the following
member:</t>
        <ul spacing="normal">
          <li>
            <t><tt>credential_hash_alg</tt>. <bcp14>REQUIRED</bcp14>. The Algorithm used of hashing the
Digital Credential to which the Status Assertion is bound, using one of the
hash algorithms listed in the <xref target="IANA-HASH-REG"/>.
Among the hash algorithms, <tt>sha-256</tt> is recommended and
<bcp14>SHOULD</bcp14> be implemented by all systems.</t>
          </li>
        </ul>
        <t>The non-normative example of an unsecured payload of
an <xref target="SD-JWT.VC"/> is shown below.</t>
        <artwork><![CDATA[
{
 "vct": "https://credentials.example.com/identity_credential",
 "given_name": "John",
 "family_name": "Doe",
 "email": "johndoe@example.com",
 "phone_number": "+1-202-555-0101",
 "address": {
   "street_address": "123 Main St",
   "locality": "Anytown",
   "region": "Anystate",
   "country": "US"
 },
 "birthdate": "1940-01-01",
 "is_over_18": true,
 "is_over_21": true,
 "is_over_65": true,
 "status": {
    "status_assertion": {
        "credential_hash_alg": "sha-256",
    }
 }
}
]]></artwork>
        <section anchor="credential-issuer-implementation-considerations">
          <name>Credential Issuer Implementation Considerations</name>
          <t>When the Digital Credential is issued, the Credential Issuer should
calculate the hash value using the algorithm specified in
<tt>status.status_assertion.credential_hash_alg</tt> and store this information
in its database. This practice enhances efficiency by allowing the
Credential Issuer to quickly compare the requested
<tt>credential_hash</tt> with the pre-calculated one, when processing
Status Assertion requests made by Holders.</t>
        </section>
      </section>
    </section>
    <section anchor="presenting-status-assertions">
      <name>Presenting Status Assertions</name>
      <t>The Wallet Instance that provides the Status Assertions using <xref target="OpenID4VP"/>, <bcp14>SHOULD</bcp14> include in the
<tt>vp_token</tt> JSON array, as defined in <xref target="OpenID4VP"/>, the Status Assertion along with the
related Digital Credential.</t>
      <t>The Verifier that receives a Digital Credential supporting the Status Assertion,
<bcp14>SHOULD</bcp14>:</t>
      <ul spacing="normal">
        <li>
          <t>Decode and validate the Digital Credential;</t>
        </li>
        <li>
          <t>Check the presence of <tt>status.status_assertion</tt> in the
Digital Credential. If true, the Verifier <bcp14>SHOULD</bcp14>:
          </t>
          <ul spacing="normal">
            <li>
              <t>produce the hash of the Digital Credential using the
hashing algorithm configured in <tt>status.status_assertion.credential_hash_alg</tt>;</t>
            </li>
            <li>
              <t>decode all the Status Assertions provided in the presentation,
by matching the JWS Header parameter <tt>typ</tt> set to <tt>status-assertion+jwt</tt>
and looking for the <tt>credential_hash</tt> value that matches with the
hash produced at the previous point;</t>
            </li>
            <li>
              <t>evaluate the validity of the Status Assertion.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="considerations-on-revocation-verification">
      <name>Considerations On Revocation Verification</name>
      <t>The recommendation for Verifiers to check the revocation status
of Digital Credentials as a '<bcp14>SHOULD</bcp14>' instead of a '<bcp14>MUST</bcp14>' acknowledges
that the decision to verify revocation is not absolute and may be
influenced by various factors. Consider as an example the case of age-over x;
even if it has expired, it may still perform its intended purpose.
As a result, the expiration status alone does not render it invalid.
The adaptability recognizes that the need to verify revocation status
may not always coincide with the actual usability of a Digital Credential,
allowing Verifiers to examine and make educated conclusions based on a
variety of scenarios.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>In the design and implementation of Status Assertions, particular
attention has been paid to privacy considerations to ensure that the
system is respectful of user privacy and compliant with relevant
regulations.</t>
      <section anchor="privacy-consideration-status-assertion-request-opacity">
        <name>Privacy Consideration: Status Assertion Request Opacity</name>
        <t>The request for a Status Assertion does not transmit the Digital Credential
for which the status is being attested. Instead, it includes a proof of
possession (PoP) of the Digital Credential that is only interpretable by the
Credential Issuer who issued the Digital Credential for which the
Status Assertion is requested. This PoP can be achieved through a
cryptographic signature using the public key contained within the
Digital Credential over the request. This method is essential for
preventing the potential for fraudulent requests intended to mislead or
disclose sensitive information to unintended parties. By separating the
Digital Credential from the Status Assertion Request, the system ensures
that the request does not inadvertently disclose any information about
the Digital Credential or its Holder. This strategy significantly
enhances the privacy and security of the system by preventing the
assertion process from being used to collect information about
Digital Credentials or their Holders through deceptive requests.</t>
      </section>
      <section anchor="privacy-consideration-opacity-of-status-assertion-content">
        <name>Privacy Consideration: Opacity of Status Assertion Content</name>
        <t>An important privacy consideration is how the Status Assertion is
structured to ensure it does not reveal any information about the User or
the Holder of the Digital Credential. The Status Assertion is crafted
to prove only the vital information needed to verify the current state
of a Digital Credential, moving beyond simple revocation or
suspension checks. This is done by focusing the assertion content on the
Digital Credential's present condition and the method for its
verification, rather than on the identity of the Digital Credential's
Holder. This approach is key in keeping the User's anonymity intact,
making sure that the Status Assertion can be applied in various
verification situations without risking the privacy of the people involved.</t>
      </section>
      <section anchor="unlinkability-and-reusability-of-status-assertions">
        <name>Unlinkability and Reusability of Status Assertions</name>
        <t>Status Assertions are designed to uphold privacy by allowing Verifiers
to operate independently, without the need for interaction or information
disclosure to third-party entities or other Verifiers. This design is
pivotal in ensuring unlinkability between Verifiers, where actions
taken by one Verifier cannot be correlated or linked to actions
taken by another. Verifiers can directly validate the status of a
Digital Credential through the Status Assertion, eliminating the need
for external communication. This mechanism is key in protecting the
privacy of individuals whose Digital Credentials are being verified, as
it significantly reduces the risk of tracking or profiling based on
verification activities across various services.</t>
        <t>While Status Assertions facilitate unlinkability, they are not inherently
"single use." The specification accommodates the batch issuance of multiple
Status Assertions, which can be single-use. However, particularly for
offline interactions, a Single Assertion may be utilized by numerous
Verifiers. This flexibility ensures that Status Assertions can support
a wide range of verification scenarios, from one-time validations to
repeated checks by different entities, without compromising the privacy
or security of the Digital Credential Holder.</t>
      </section>
      <section anchor="untrackability-by-digital-credential-issuers-and-the-phone-home-problem">
        <name>Untrackability by Digital Credential Issuers and the "Phone Home" Problem</name>
        <t>A fundamental aspect of the privacy-preserving attributes of
Status Assertions is their ability to address the "phone home" problem,
which is the prevention of tracking by Digital Credential Issuers.
Traditional models often require Verifiers to query a central status
list or contact the issuer directly, a process that can inadvertently
allow Credential Issuers to track when and where a Digital Credential
is verified. Status Assertions, however, encapsulate all necessary
verification information within the assertion itself. This design choice
ensures that Credential Issuers are unable to monitor the verification
activities of their issued Digital Credentials, thereby significantly
enhancing the privacy of the Holder. By removing the need for real-time
communication with the Issuer for status checks, Status Assertions
effectively prevent the Issuer from tracking verification activities,
further reinforcing the system's dedication to protecting User privacy.</t>
      </section>
      <section anchor="minimization-of-data-exposure">
        <name>Minimization of Data Exposure</name>
        <t>The Status Assertions are designed around the data minimization principle.
Data minimization ensures that only the necessary information required
for the scope of attesting the non revocation status of the Digital
Credential. This minimizes the exposure of potentially sensitive data.</t>
      </section>
      <section anchor="resistance-to-enumeration-attacks">
        <name>Resistance to Enumeration Attacks</name>
        <t>The design of Status Assertions incorporates measures to resist
enumeration attacks, where an adversary attempts to gather information
by systematically verifying different combinations of data.
By implementing robust cryptographic techniques and limiting the
information contained in Status Assertions, the system reduces the
feasibility of such attacks. This consideration is vital for safeguarding
the privacy of the Holders and for ensuring the integrity of
the verification process.</t>
        <t>Status Assertions are based on a privacy-by-design approach, reflecting
a deliberate effort to balance security and privacy needs in the
Digital Credential ecosystem.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="json-web-token-claims-registration">
        <name>JSON Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "JSON Web Token Claims" registry <xref target="IANA.JWT"/> established by <xref target="RFC7519"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: <tt>credential_hash</tt></t>
          </li>
          <li>
            <t>Claim Description: Hash value of the Digital Credential the Status Assertion is bound to.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="status-assertion">this specification</xref></t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: <tt>credential_hash_alg</tt></t>
          </li>
          <li>
            <t>Claim Description: The Algorithm used of hashing the Digital Credential to which the Status Assertion is bound.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="status-assertion">this specification</xref></t>
          </li>
        </ul>
      </section>
      <section anchor="media-type-registration">
        <name>Media Type Registration</name>
        <t>This section requests registration of the following media types <xref target="RFC2046"/> in
the "Media Types" registry <xref target="IANA.MediaTypes"/> in the manner described
in <xref target="RFC6838"/>.</t>
        <t>To indicate that the content is a JWT-based Status Assertion:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion-request+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary; A JWT-based Status Assertion Request object is a JWT; JWT values are encoded as a series of base64url-encoded values (some of which may be the empty string) separated by period ('.') characters.</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of <xref target="security-considerations">this specification</xref></t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for requesting Status Assertions.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a CWT-based Status Assertion Request:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion-request+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of <xref target="security-considerations">this specification</xref></t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for requesting Status Assertions.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a JWT-based Status Assertion:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of <xref target="security-considerations">this specification</xref></t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for issuing or presenting Status Assertions.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a CWT-based Status Assertion:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of <xref target="security-considerations">this specification</xref></t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for issuing or presenting Status Assertions.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a JWT-based Status Assertion Error:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion-error+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of <xref target="security-considerations">this specification</xref></t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for issuing Status Assertions Request Errors.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a CWT-based Status Assertion Error:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion-error+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of <xref target="security-considerations">this specification</xref></t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for issuing Status Assertions Request Errors.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7516">
          <front>
            <title>JSON Web Encryption (JWE)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Hildebrand" initials="J." surname="Hildebrand"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification. Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7516"/>
          <seriesInfo name="DOI" value="10.17487/RFC7516"/>
        </reference>
        <reference anchor="RFC7517">
          <front>
            <title>JSON Web Key (JWK)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7517"/>
          <seriesInfo name="DOI" value="10.17487/RFC7517"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC7800">
          <front>
            <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter. Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7800"/>
          <seriesInfo name="DOI" value="10.17487/RFC7800"/>
        </reference>
        <reference anchor="RFC8152">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8152"/>
          <seriesInfo name="DOI" value="10.17487/RFC8152"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8747">
          <front>
            <title>Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>This specification describes how to declare in a CBOR Web Token (CWT) (which is defined by RFC 8392) that the presenter of the CWT possesses a particular proof-of-possession key. Being able to prove possession of a key is also sometimes described as being the holder-of-key. This specification provides equivalent functionality to "Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)" (RFC 7800) but using Concise Binary Object Representation (CBOR) and CWTs rather than JavaScript Object Notation (JSON) and JSON Web Tokens (JWTs).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8747"/>
          <seriesInfo name="DOI" value="10.17487/RFC8747"/>
        </reference>
        <reference anchor="RFC9126">
          <front>
            <title>OAuth 2.0 Pushed Authorization Requests</title>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="D. Tonge" initials="D." surname="Tonge"/>
            <author fullname="F. Skokan" initials="F." surname="Skokan"/>
            <date month="September" year="2021"/>
            <abstract>
              <t>This document defines the pushed authorization request (PAR) endpoint, which allows clients to push the payload of an OAuth 2.0 authorization request to the authorization server via a direct request and provides them with a request URI that is used as reference to the data in a subsequent call to the authorization endpoint.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9126"/>
          <seriesInfo name="DOI" value="10.17487/RFC9126"/>
        </reference>
        <reference anchor="OpenID.Core" target="https://www.iana.org/assignments/media-types/media-types.xhtml">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="OpenID4VCI" target="https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0.html">
          <front>
            <title>OpenID for Verifiable Credential Issuance</title>
            <author>
              <organization>OpenID Foundation</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.MediaTypes" target="https://www.iana.org/assignments/media-types/media-types.xhtml">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JOSE" target="https://www.iana.org/assignments/jose/jose.xhtml">
          <front>
            <title>JSON Object Signing and Encryption (JOSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JWT" target="https://www.iana.org/assignments/jwt/jwt.xhtml">
          <front>
            <title>JSON Web Token Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.CWT" target="https://www.iana.org/assignments/cwt/cwt.xhtml">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC9596">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) "typ" (type) Header Parameter</title>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <author fullname="O. Steele" initials="O." surname="Steele"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This specification adds the equivalent of the JSON Object Signing and Encryption (JOSE) "typ" (type) header parameter to CBOR Object Signing and Encryption (COSE). This enables the benefits of explicit typing (as defined in RFC 8725, "JSON Web Token Best Current Practices") to be brought to COSE objects. The syntax of the COSE type header parameter value is the same as the existing COSE content type header parameter.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9596"/>
          <seriesInfo name="DOI" value="10.17487/RFC9596"/>
        </reference>
        <reference anchor="IANA-HASH-REG" target="https://www.iana.org/assignments/named-information/named-information.xhtml#hash-alg">
          <front>
            <title>IANA - Named Information Hash Algorithm Registry</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="draft-ietf-oauth-status-list" target="https://datatracker.ietf.org/doc/draft-ietf-oauth-status-list">
          <front>
            <title>draft-ietf-oauth-status-list</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ECHR-ART8" target="https://www.echr.coe.int/documents/convention_eng.pdf">
          <front>
            <title>Article 8 of the European Convention on Human Rights</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="GDPR" target="https://gdpr-info.eu/">
          <front>
            <title>GDPR</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SD-JWT.VC">
          <front>
            <title>SD-JWT-based Verifiable Credentials (SD-JWT VC)</title>
            <author fullname="Oliver Terbu" initials="O." surname="Terbu">
              <organization>MATTR</organization>
            </author>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete Inc.</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This specification describes data formats as well as validation and
   processing rules to express Verifiable Credentials with JSON payloads
   with and without selective disclosure based on the SD-JWT
   [I-D.ietf-oauth-selective-disclosure-jwt] format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-sd-jwt-vc-03"/>
        </reference>
        <reference anchor="ISO.mdoc">
          <front>
            <title>ISO/IEC 18013-5:2021 ISO-compliant driving licence</title>
            <author>
              <organization>ISO/IEC JTC 1/SC 17</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="OpenID4VP" target="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html">
          <front>
            <title>OpenID for Verifiable Credential Presentation</title>
            <author>
              <organization>OpenID Foundation</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC6066" target="https://datatracker.ietf.org/doc/html/rfc6066">
          <front>
            <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 961?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank:</t>
      <ul spacing="normal">
        <li>
          <t>Paul Bastien</t>
        </li>
        <li>
          <t>Sara Casanova</t>
        </li>
        <li>
          <t>Emanuele De Cupis</t>
        </li>
        <li>
          <t>Riccardo Iaconelli</t>
        </li>
        <li>
          <t>Marina Adomeit</t>
        </li>
        <li>
          <t>Victor Näslund</t>
        </li>
        <li>
          <t>Giada Sciarretta</t>
        </li>
        <li>
          <t>Amir Sharif</t>
        </li>
      </ul>
    </section>
    <section anchor="document-history">
      <name>Document History</name>
      <t>-02</t>
      <ul spacing="normal">
        <li>
          <t>Removed several comparisons with OAuth Status List</t>
        </li>
        <li>
          <t>Status Assertion Request and Response is now a json array with multiple entries.</t>
        </li>
        <li>
          <t>Better generalization about the confirmation methods.</t>
        </li>
        <li>
          <t>Removed any informative comparison with OAuth Status List.</t>
        </li>
        <li>
          <t>JWT and CWT typ.</t>
        </li>
        <li>
          <t>Name of the draft changed from <tt>OAuth Status Attestations</tt> to <tt>OAuth Status Assertions</tt>.</t>
        </li>
        <li>
          <t>Extended Status Assertion errors table added in <xref target="status-assertion-error">the section Status Error</xref>.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
